This book provides a detailed insight into the complex dynamics of radicalization that are in play amongst contemporary society. The authors focus on understanding emerging trends and models that can be used to analyse and understand modern vio...Loe edasi...

Serverless Architectures on AWS, Second Edition teaches you how to design, secure, and manage serverless backend APIs for web and mobile applications on the AWS platform. Youll get going quickly with this books relevant real-world ex...Loe edasi...

This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professional...Loe edasi...

This book examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors share their expertise in their respective chapters on a broad range of security and privacy challenges and state of...Loe edasi...

This reader-friendly textbook presents a comprehensive overview of the essential aspects of cloud computing, from the origin of the field to the latest developments. Rather than merely discussing the cloud paradigm in isolation, the text also exam...Loe edasi...

The integrated meta-model for organizational resource audit is a consistent and comprehensive instrument for auditing intangible resources and their relations and associations from the network perspective. This book undertakes a critically importa...Loe edasi...

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on...Loe edasi...

This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12–13 March, 2019. Organ...Loe edasi...

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerg...Loe edasi...

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of infor...Loe edasi...

This book provides a complete and strategic overview of Multi-Access Edge Computing (MEC). It covers network and technology aspects, describes the market scenarios from the different stakeholders’ point of view, and analyzes deployment aspects and...Loe edasi...

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intell...Loe edasi...

Telecommunications have underpinned social interaction and economic activity since the 19th century and have been increasingly reliant on optical fibers since their initial commercial deployment by BT in 1983. Today, mobile phone networks, data ce...Loe edasi...

Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to...Loe edasi...

The volume The UNESCO Memory of the World Programme: Key Aspects and Recent Developments responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which h...Loe edasi...

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded wit...Loe edasi...

Begins with an introduction to information security, including key topics such as confidentiality, integrity, and availability, and then moves on to practical applications of these ideas in the areas of operational, physical, network, application, a...Loe edasi...